Resources to microsoft 70 680

Exam Code: microsoft 70 680 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: TS:Windows 7,Configuring
Certification Provider: Microsoft
Free Today! Guaranteed Training- Pass microsoft 70 680 Exam.

Q201. - (Topic 3) 

You are the administrator of a computer named Computer1 that runs Windows 7. Several users share Computer1. The users plan to encrypt files on the computer. 

You need to ensure that you can access all encrypted files on the computer. 

What should you do first? 

A. At a command prompt, run Cipher.exe. 

B. At a command prompt, run Certutil.exe. 

C. From the local computer policy, modify the User Rights Assignment. 

D. From User Accounts, run the Manage your file encryption certificates wizard. 



Cipher Displays or alters the encryption of folders and files on NTFS volumes. Used without parameters, cipher displays the encryption state of the current folder and any files it contains. Administrators can use Cipher.exe to encrypt and decrypt data on drives that use the NTFS file system and to view the encryption status of files and folders from a command prompt. The updated version adds another security option. This new option is the ability to overwrite data that you have deleted so that it cannot be recovered and accessed. When you delete files or folders, the data is not initially removed from the hard disk. Instead, the space on the disk that was occupied by the deleted data is "deallocated." After it is deallocated, the space is available for use when new data is written to the disk. Until the space is overwritten, it is possible to recover the deleted data by using a low-level disk editor or data-recovery software. 

If you create files in plain text and then encrypt them, Encrypting File System (EFS) makes a backup copy of the file so that, if an error occurs during the encryption process, the data is not lost. After the encryption is complete, the backup copy is deleted. As with other deleted files, the data is not completely removed until it has been overwritten. The new version of the Cipher utility is designed to prevent unauthorized recovery of such data. 

/K Creates a new certificate and key for use with EFS. If this option is chosen, all the other options will be ignored. By default, /k creates a certificate and key that conform to current group plicy. If ECC is specified, a self-signed certificate will be created with the supplied key size. /R Generates an EFS recovery key and certificate, then writes them to a .PFX file (containing certificate and private key) and a .CER file (containing only the certificate). An administrator may add the contents of the .CER to the EFS recovery policy to create the recovery for users, and import the .PFX to recover individual files. If SMARTCARD is specified, then writes the recovery key and certificate to a smart card. A .CER file is generated (containing only the certificate). No .PFX file is genereated. By default, /R creates an 2048-bit RSA recovery key and certificate. If EECC is specified, it must be followed by a key size of 356, 384, or 521. 

Q202. - (Topic 2) 

Your network consists of an Active Directory domain and 100 computers that run Windows 7. 

The domain contains a logon script named logon.cmd. 

You plan to deploy a new application named app1.msi by using the logon script. App1.msi is stored in \\\\server1\\share1. 

You need to modify the logon script to deploy the application. 

What should you include in the logon script? 

A. Sbdinst.exe -u \\\\server1\\share1\\app1.msi -q 

B. Msinfo32.exe \\\\server1\\share1\\app1.msi 

C. Pkgmgr.exe /ip /m:\\\\server1\\share1\\app1.msi 

D. Msiexec.exe /i \\\\server1\\share1\\app1.msi /quiet 



Msiexec Provides the means to install, modify, and perform operations on Windows Installer from the command line. 

To install or configure a product Syntax msiexec /i {package|ProductCode} /i : Installs or configures a product. 

NOT Msinfo32 Displays a comprehensive view of your hardware, system components, and software environment. 

Q203. - (Topic 4) 

Your company network includes portable computers that have Windows 7 Ultimate and Windows 7 Professional installed. 

You want to standardize all portable computers to Windows 7 Professional for Key Manager Server (KMS) licensing purposes. 

You need to install Windows 7 Professional on all Windows 7 Ultimate portable computers. 

What should you do? 

A. Launch Windows Update 

B. Perform a clean installation over the existing system partitions. 

C. Perform a clean installation on non-system partitions. 

D. Supply the Windows 7 Professional KMS key. 

E. Launch Windows Anytime Upgrade. 



Think that this is right don't think it can be done 

Q204. - (Topic 4) 

Your company network has a single-domain Active Directory forest. The forest functional level is set to Windows Server 2008 R2. All computers are members of the domain. 

You plan to deploy Windows BitLocker Drive Encryption (BitLocker) on portable computers that have Windows 7 Enterprise installed. 

You need to be able to automatically back up recovery passwords for BitLocker-protected disk volumes on the portable computers. 

What should you do before you start encrypting the disk volumes with BitLocker? 

A. Select the Turn on BitLocker backup to Active Directory option in Group Policy linked to the portable computers. 

B. Run the cscript Get-TPMOwnerlnfo.vbs script on the client computers. 

C. Run the manage-bde -on C: -RecoveryPassword command on the portable computers. 

D. Run the Idifde -i -v -f BitLockerTPMSchemaExtension.ldf -c script on a domain controller. 


Q205. HOTSPOT - (Topic 6) 

You are a system administrator for a regional accounting firm. The existing computers have either Windows Vista Enterprise or Windows Vista Home Premium installed. 

Your manager wants you to upgrade all computers to Windows 7. 

You need to determine which editions of Windows 7 support an in-place upgrade from the two editions of Windows Vista. 

In the table below, identify which editions of Windows 7 will support an in-place upgrade from Windows Vista Enterprise and Home Premium. (Make only one selection in each column. This question is worth two points. ) 


Q206. - (Topic 1) 

You have a Virtual Hard Disk (VHD) and a computer that runs Windows 7. The VHD has Windows 7 installed. 

You need to start the computer from the VHD. 

What should you do? 

A. From Diskpart.exe, run Select vdisk. 

B. From Disk Management, modify the active partition. 

C. Run Bootcfg.exe and specify the /default parameter. 

D. Run Bcdedit.exe and modify the Windows Boot Manager settings. 



When you have created a VHD and installed a system image on it, you can use the BCDEdit tool Bcdedit.exe to add a boot entry for the VHD file in your computer running Windows 7. 

Q207. - (Topic 4) 

You have a computer that runs Windows 7. Your computer s disk configuration is shown in the exhibit. (Click the Exhibit button.) 

You need to ensure that you can create a striped volume on the computer. 

What should you do? 

A. Add an additional hard disk. 

B. Convert all disks to dynamic disks. 

C. Install a digitally-signed disk driver. 

D. Set the Startup Type of the Virtual Disk Service (VDS) to Automatic. 



A striped volume is a dynamic volume that stores data in stripes on two or more physical disks. Data in a striped volume is allocated alternately and evenly (in stripes) across the disks. Striped volumes offer the best performance of all the volumes that are available in Windows, but they do not provide fault tolerance. If a disk in a striped volume fails, the data in the entire volume is lost. 

You can create striped volumes only on dynamic disks. Striped volumes cannot be extended. 

You can create a striped volume onto a maximum of 32 dynamic disks. 

Backup Operator or Administrator is the minimum membership required to complete the actions below. 

Creating a striped volume 

Using the Windows interface 

Using a command line 

To create a striped volume using the Windows interface 

In Disk Management, right-click the unallocated space on one of the dynamic disks where you want to create the striped volume, and then click New Striped Volume…. 

Follow the instructions on your screen. 

To create a striped volume using a command line 

Open a command prompt and type diskpart. 

At the DISKPART prompt, type list disk. Make note of the number of the disk where you want to create a striped volume. 

At the DISKPART prompt, type create volume stripe [size=<size>] 



Q208. - (Topic 2) 

You have a computer that runs windows 7. 

The network contains a monitoring server named server1 Computer runs a monitoring service named service1. 

Service 1 uses remote procedure. You need to ensure that service1 can receive requests from server1. 

What should you do? 

A. From windows Firewall with Advanced Security, create a predefined rule. 

B. From windows Firewall with Advanced Security, create custom rule. 

C. From the Network and Sharing Center, modify the network location settings. 

D. From the Network and Sharing Center, modify the advanced sharing settings. 



Creating WFAS Rules The process for configuring inbound rules and outbound rules is essentially the same: In the WFAS console, select the node that represents the type of rule that you want to create and then click New Rule. This opens the New Inbound (or Outbound) Rule Wizard. The first page, allows you to specify the type of rule that you are going to create. You can select between a program, port, predefined, or custom rule. The program and predefined rules are similar to what you can create using Windows Firewall. A custom rule allows you to configure a rule based on criteria not covered by any of the other options. You would create a custom rule if you wanted a rule that applied to a particular service rather than a program or port. You can also use a custom rule if you want to create a rule that involves both a specific program and a set of ports. For example, if you wanted to allow communication to a specific program on a certain port but not other ports, you would create a custom rule. 

Q209. - (Topic 1) 

If you have a router in the network your connected to and the Default Gateway is set to and the subnet mask is, which of the following are useable IP addresses on that network? 






Q210. DRAG DROP - (Topic 5) 

Your company network includes a Windows Server 2008 R2 server named Server 1. You use a client computer named Client1 that has Windows 7 Enterprise installed. Both computers are members of an Active Directory domain. 

You want to automatically collect events from Client1 to Server1. Bandwidth delivery optimization will not be used along with the subscription. 

You need to configure the required collector-initiated subscription. 

What should you do? (To answer, drag the appropriate configuration step or configuration steps to the correct target computer or target computers in the answer area. An answer choice can be used once, more than once, or not at all.) 


Microsoft 70-680 Certification Sample Questions and Answers:

P.S. New 70-680 dumps PDF: